diff --git a/digid_eherkenning/oidc/models/base.py b/digid_eherkenning/oidc/models/base.py index 49d41ac..ec9c3ad 100644 --- a/digid_eherkenning/oidc/models/base.py +++ b/digid_eherkenning/oidc/models/base.py @@ -8,14 +8,14 @@ def get_default_scopes_bsn(): """ - Returns the default scopes to request for OpenID Connect logins + Returns the default scopes to request for OpenID Connect logins for DigiD. """ return ["openid", "bsn"] def get_default_scopes_kvk(): """ - Returns the default scopes to request for OpenID Connect logins + Returns the default scopes to request for OpenID Connect logins for eHerkenning. """ return ["openid", "kvk"] diff --git a/digid_eherkenning/oidc/views.py b/digid_eherkenning/oidc/views.py index 9b81ce7..bcc206c 100644 --- a/digid_eherkenning/oidc/views.py +++ b/digid_eherkenning/oidc/views.py @@ -23,7 +23,7 @@ class OIDCAuthenticationCallbackView(BaseCallbackView): Check if the 'created user' from the authentication backend needs to be logged in. If we only want to perform the claim processing, then no real user is expected to - be returend from the authentication backend, and hence we also don't want to try + be returned from the authentication backend, and hence we also don't want to try to log in this dummy user (as in, set ``request.user`` to a django user instance).